PolarSSL 1.2.4 released

Description

This bug fix release patches a few small issues. CertificateRequest Handshake messages are now correctly handled in the future, if a new version of TLS sees the light. An SSL client now correctly handles a CertificateRequest message sent in TLS 1.1 or earlier that has an empty Distinguished Names list. In addition a memory leak when performing PKCS#1 v2.1 operations (RSA_PKCS_V21) has been handled.

One small API function was added, called ssl_handshake_step() to allow an application to handle the handshake in single steps.

Who should update

Our advice for users of the PolarSSL 1.2 branch is to update:

in order to prevent handshake failures when servers request a certificate without a DN list